Protecting your personal photos

Compromised and confused: that's what a handful of celebrities are feeling after learning their iCloud accounts were hacked, and personal and even racy photographs were leaked online. But with so many of us relying on our iPhone's as a digital scrapbook, how can you make sure your images aren't stolen next? Channel 4's Adrienne Moore spoke with a network administrator with the Bradford County Sheriff's Office to explain how you can protect yourself.

MAN THEY'RE LOOKING FOR. THEY HOPE TO HAVE IT BY THE END OF THE WEEK. COMPROMISE AND CONFUSED. THAT IS WHAT A HANDFUL OF CELEBRITIES AFTER LEARNING THEIR iCLOUD ACCOUNTS WERE HACKED AND RACY, PERSONAL PHOTOGRAPHS WERE LEAKED ON-LINE. WITH SO MANY RELYING ON THE iPHONES HOW CAN YOU MAKE SURE YOUR IMAGES AREN'T STOLEN NEXT? AIDEN MOORE HAS MORE TO EXPLAIN HOW YOU CAN PROTECT YOURSELF IN TONIGHT'S CRIME ALERT. Reporter: CHRIS SAYS THERE ARE THREE STEPS YOU CAN TAKE TO MAKE SURE YOUR PERSONAL PICTURES DON'T BECOME PUBLIC CONSUMPTION. FIRST AND FOREMOST, MAKE SURE YOU ARE USING STRONG PASSWORDS. DON'T REUSE ANY OF THEM. NEXT THING IS DISABLE YOUR iCLOUD. ALL YOU HAVE TO DO IS PULL UP THE PHONE. GO TO SETTINGS, ALL THE WAIT DOWN TO iCLOUD, TAP ON THAT. SCROLL DOWN UNTIL YOU SEE THE PICTURES ICON. MAKE SURE ALL OF THESE IN YOUR PHOTO STREAM ARE DISABLED. DIGITAL SCRAP BOOKS APPEAR TO BE UNDER ATTACK AFTER WEB FORUMS CLAIM TO HAVE COMPROMISED THE ACCOUNTS OF JENNIFER LAWRENCE. DOES APPLE HAVE A VULNERABILITY HERE? IF GO IF THEY DOES IT' NOT IN THEIR BETTER INTEREST TO DISCLOSE IT BUT PATCH IT AS QUICKLY AS POSSIBLE. IT'S UNLIKELY GIVEN THE SHEER VOLUME THEY DEAL WITH THEY HAVE A VULNERABILITY THAT WOULD SPECIFICALLY ALLOW SOMEBODY TO TARGET CELEBRITIES. Reporter: WITH 320 MILLION USERS iCLOUD STORES DATA INCLUDING MUSIC AND PICTURES AND SYNCS THEM. TECH EXPERTS LIKE CHRIS SAY THE BEST BET FOR ANYONE QUESTIONING APPLE SECURITY NEED TO ADD AN EXTRA LAYER OF PROTECT BY TURNING ON TWO-DENVER NICKATION ON YOUR -- VERIFICATION. IT SENDS THEM A 4 DIGIT CODE TO THEIR PHONE TO A REGISTERED DEVICE. NO CODE. NO ACCESS. Reporter: THE HACKERS CAN GAIN INITIAL ACK TEST THROUGH SOCIAL ENGINEERING OR FISHING. THEY SEND YOU AN e-MAIL SENDING WE THINK YOUR E-MAIL HAS GOTTEN HACKED P. YOU ARE PROVIDING THE INFORMATION TO THE HACKERS WHEN YOU DO THAT. THAT IS A FISHING ATTACK. Reporter: IS NOUR BACKUP IS NOT PASSWORD PROTECTED ALL IT TAKES IS A CYBERCRIMINAL TO SYNH THEIR DEVICE TO OURS. KNOW WHERE THE DATA IS GOING, NO WHO CAN ACCESS IT. IF YOU DON'T KNOW HOW TO AUDIT YOUR APPLE ACCOUNT TO SEE WHICH DEVICES ARE ACCESSING IT FIND SOMEBODY WHO DOES. Reporter: CHRIS SAYS THAT CELEBRITIES ARE OFTEN TARGETS OF THE ATTACKS BECAUSE SO MUCH OF THEIR PERSONAL INFORMATION CAN BE ACCESSED ON LINE. THE ONLY WAY TO MAKE SURE CERTAINLY IMAGES ARE NOT

Comments

The views expressed below are not those of News4Jax or its affiliated companies. By clicking on "Post," you acknowledge that you have read the Terms of Service and your comment is in compliance with such terms. Readers, please help keep this discussion respectful and on topic by flagging comments that are offensive or inappropriate (hover over the commenter's name and you'll see the flag option appear on right side of that line). And remember, respect goes both ways: Tolerance of others' opinions is important in a free discourse. If you're easily offended by strong opinions, you might skip reading comments entirely.